An administrator is tasked with installing an application patch on a virtual server. The administrator needs the ability to restore the server to its previous state quickly if the patch corrupts the system. Which of the following should the administrator do to accomplish this task?
A. Install the patch on a development server
B. Create a full backup
C. Create a snapshot
D. Install the patch on a test server
Although the SAN appears to be running without any problems, the technician is unable to reach the SAN's web enabled management interface. Which of the following tools can the technician use to QUICKLY find where the communication failure occurred?
A. arp
B. traceroute
C. ping
D. ipconfig
Which of the following is the BEST means of ensuring resource utilization remains even across the hosts?
A. Resource pooling
B. VM affinity
C. Dynamic VM placement
D. VM high availability
The Chief Information Officer (CIO) tells the IT department that all non business critical production applications can be down for no more than 48 hours. Which of the following has the CIO defined?
A. Failback
B. RPO
C. RTO
D. Failover
Encryption ensures which of the following? (Select TWO).
A. Access control
B. Data loss
C. Confidentiality
D. Authentication
E. Data integrity
A programmer removes OS software from a laptop during development of a new prototype for the company. After the code is promoted from development to QA, none of the QA testers can get the application to work. Which of the following is MOST likely the cause of the application not working properly in QA?
A. QA systems require a reboot after a new application is installed
B. Programmer did not compile the code properly
C. Programmer put the source code in repository without any validations
D. QA systems are missing patches
In a storage fabric, which of the following is the primary way to implement multipathing?
A. Formatting
B. Scaling
C. Zoning
D. Caching
A company has two datacenters in different cities. When one of the datacenters loses power, there is near instant failover to the other datacenter. This is an example of which of the following?
A. Warm site
B. Hot site
C. Offsite storage
D. Backup
A company wants to streamline their reporting tools. They have decided to implement a third party SaaS cloud reporting tool to process additional data, but will continue to process confidential data internally. Which of the following deployment models is BEST suited for the company?
A. Shared
B. Private
C. Hybrid
D. Community
A system administrator is planning storage infrastructure to store backup copies of virtual machines that are at least 5GB in size. Which of the following file systems can be used in this scenario? (Select TWO).
A. SMB
B. RAW
C. EXT
D. FAT
E. NTFS
Virtual switches are: A. Virtualized network switching devices.
B. Used to differentiate network traffic with tags.
C. Virtual machines that are on the same network.
D. Physical switches running on the same network with virtual machines.
Anne, a disgruntled employee, decides to load a VM onto a USB drive, in order to take her work to a competitor. Anne is able to insert the USB drive and copy over all pertinent files so she can boot the VM from any machine. Which of the following could have prevented this from occurring?
A. Change management policy
B. System hardening policy
C. Termination policy
D. Business impact analysis
An administrator has been tasked with reducing costs by consolidating a firewall, proxy server, and NIPS. Which of the following risks does this change introduce?
A. NIC failure
B. Disk failure
C. CPU failure
D. Single point of failure
An enterprise hypervisor offers which of the following benefits over a workstation hypervisor?
A. Ability to create templates
B. Ability to provision more than 2 vCPUs
C. Snapshots
D. Live storage migration
After receiving a report from the helpdesk that a database application is exhibiting degraded performance, the storage administrator detected an issue. Which of the following is MOST likely the issue that was discovered resulting in the degraded performance?
A. NIC failure
B. Power supply failure
C. Disk failure
D. HBA failure